Sciweavers

1249 search results - page 181 / 250
» Limitations of the Even-Mansour Construction
Sort
View
HUMO
2000
Springer
14 years 1 months ago
Hand Shape Estimation Using Image Transition Network
This paper presents a method of hand posture estimation from silhouette images taken by two cameras. First, we extract the silhouette contour for a pair of images. We construct an...
Yasushi Hamada, Nobutaka Shimada, Yoshiaki Shirai
PRICAI
2000
Springer
14 years 1 months ago
Extracting Logical Schema from the Web
One of the main limitations when accessing the web is the lack of explicit structure, whose presence may help in understanding data semantics. Schema for web data can be constructe...
Vincenza Carchiolo, Alessandro Longheu, Michele Ma...
DL
1995
Springer
120views Digital Library» more  DL 1995»
14 years 1 months ago
A New Zealand Digital Library for Computer Science Research
: A large amount of computing literature has become available over the Internet, as university departments and research institutions have made their technical reports, preprints, a...
Ian H. Witten, Sally Jo Cunningham, Mahendra Valla...
ICDCS
1995
IEEE
14 years 1 months ago
Parallel Processing on Networks of Workstations: A Fault-Tolerant, High Performance Approach
One of the mostsoughtaftersoftware innovation of thisdecade is the construction of systems using off-the-shelf workstations that actually deliver, and even surpass, the power and ...
Partha Dasgupta, Zvi M. Kedem, Michael O. Rabin
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
14 years 1 months ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang